sqreen / DevelopersSecurityBestPracticesLinks
☆77Updated 2 years ago
Alternatives and similar repositories for DevelopersSecurityBestPractices
Users that are interested in DevelopersSecurityBestPractices are comparing it to the libraries listed below
Sorting:
- Sqreen Security Checklist Transformer & Uploader☆27Updated 4 years ago
- A static website template for security pages.☆52Updated 10 months ago
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Updated 8 years ago
- ☆11Updated 8 years ago
- A static-code-analysis tool for performing security-focused code reviews. It enables an auditor to swiftly map the attack-surface of a la…☆139Updated last year
- An enchanting 🔮 web screenshot tool for capturing and sharing web content effortlessly☆33Updated last month
- Scans every git push to your Github organisations to find unwanted secrets.☆87Updated 2 months ago
- ZAP Management Scripts☆23Updated last month
- Hayat is a script for report and analyze Google Cloud Platform resources.☆80Updated 5 years ago
- Content for 'Measuring Software Quality using Application Security' book published at LeanPub☆38Updated 8 years ago
- ☆83Updated 2 years ago
- Interactive IPython Notebook to demonstrate OWASP ZAP's API and Scripting Functions - OWASP ZAP 2.8.0☆41Updated 2 years ago
- scan s3 buckets for security issues☆85Updated 11 months ago
- AWS S3 Hacks☆78Updated 6 years ago
- A curated list of security tools for Hackers & Builders!☆100Updated 11 months ago
- The Security Dependency Orchestrator Service☆88Updated 4 years ago
- Scripts for AWS amusement...☆21Updated 3 years ago
- Compare the contents of your hosted and proxy repositories for coordinate collisions☆62Updated 4 years ago
- Reapsaw is a continuous security devsecops tool, which helps in enabling security into CI/CD Pipeline. It supports coverage for multiple …☆41Updated 4 years ago
- Slides from presentations I give!☆25Updated 2 months ago
- Monitors Github for leaked secrets☆200Updated 8 months ago
- A tool for testing continuous integration (CI) or continuous delivery (CD) system security☆23Updated 12 years ago
- A curated collection of tools and resources for building security with a developer first approach.☆28Updated 2 years ago
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆70Updated 5 years ago
- Defcon24 Workshop Contents : Ninja Level Infrastructure Monitoring☆127Updated 8 years ago
- ☆28Updated 2 years ago
- ☆19Updated last year
- Collection of links to Security stuff☆115Updated 6 months ago
- Intentionally Vulnerable Serverless Functions to understand the specifics of Serverless Security Vulnerabilities☆136Updated 2 years ago
- INACTIVE - Collection of Tools & Procedures for double checking GitHub configurations☆137Updated last year